CVE-2022-49373

Source
https://cve.org/CVERecord?id=CVE-2022-49373
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49373.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49373
Downstream
Related
Published
2025-02-26T02:11:14.603Z
Modified
2026-04-11T12:43:57.292254Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe
Details

In the Linux kernel, the following vulnerability has been resolved:

watchdog: ts4800wdt: Fix refcount leak in ts4800wdt_probe

ofparsephandle() returns a node pointer with refcount incremented, we should use ofnodeput() on it when done. Add missing ofnodeput() in some error paths.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49373.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf9006399939762e6cd32445e848e56727df9d98
Fixed
5b110d940417942bc87d9e4bea6d4f24e05ed483
Fixed
910b1cdf6c50ae8fb222e46657d04fb181577017
Fixed
7a4afd8a003d6abf1f5d159c2bb67e6b7cbde253
Fixed
91fa5aa53f68b85e779164b3127c7e23cad5c457
Fixed
f067b5286edfd83d2d3903e8578b561599d62539
Fixed
5d24df3d690809952528e7a19a43d84bc5b99d44

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49373.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.5.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49373.json"